The aim of this paper is to discuss the principles behind Passive Radio-Frequency Identification and the principles behind the exploitation, as well as the practical methods that can be used to exploit RFID.
You can download it from the following link: https://packetstormsecurity.com/files/download/125137/rfie.pdf
Source: https://packetstormsecurity.com/files/125137/Radio-Frequency-Identification-Exploitation.html

